Types of viruses and security measures ♛


Hey my lovely Humans!  Today we will Talk about viruses. If i missed anything or found anything wrong. You can give your feedback in telegram .

The main types of malware:

A virus is a program code that penetrates the computer system and infects files on the computer. The main task of a virus is to harm the operating system. Infection occurs mainly when visiting malicious sites, downloadng files from dubious resources, opening letters from unknown senders.

Worm (IM-Worm) - do not infect user files. Penetrating into the system, they begin to multiply uncontrollable, looking for vulnerabilities in the network in order to spread further. The vital activity of computer worms "eats up" a lot of computer system resources. An IM worm is a type of network worm that spreads via instant messengers.

Trojan (Trojan) - this infection is usually embedded in "peaceful" or hacked programs that are distributed free of charge. The main task of the Trojan is to steal confidential user data or install malicious code.

Malicious Crypto Miner (Trojan-miner) - getting into the system heavily loads the processor, using system computing resources for cryptocurrency mining. This malware can disguise itself as the work of system processes.

Ransomware ( ransomware ) - is distributed by cybercriminals on the Internet in the form of complex cryptographic algorithms, with the aim of encrypting files on users' computers, with subsequent demand for ransom for decrypting them.

Rootkit (rootkit) - malicious code that secretly operates in the operating system. The actions of such a code are very difficult to detect by anti-virus programs. Designed for remote computer control, stealing logins and passwords from all kinds of accounts, confidential bank details.

Backdoor - a user's computer infected with such malware allows an attacker to remotely download and upload files, install applications and programs, turn on a microphone and camera for spying purposes - and in general, in principle, remotely control someone else's computer.

Downloader - usually only a part of the code is used, which, once in the system, downloads the full version of the malicious software. The system is infected when viewing pictures and saving various attachments.

Hoax (hoax) is the safest software, since it does not directly harm the computer, however, it poses a danger for overly gullible users with messages about any winnings in the lottery, fake messages about security threats with any suggestions for eliminating them, and so on. ...

Hacktool - penetrating the computer, this malware adds new users who are allowed to use the operating system, and also deletes or hides system logs, hides traces of intruders in the system.

Code of Conduct to Protect Against Cybercriminals:

When transferring your personal data, you need to be 100% sure that it is safe, and the resource that requests such data is verified and safe.

Ignore all sorts of offers to buy unprecedentedly cheap goods, reports of unexpected winnings in all kinds of lotteries, and so on.

It is obligatory to have an antivirus program of the latest version and with updated databases.

Following an unknown link? is fraught with the most unexpected consequences.

It will not be superfluous to regularly pay attention to the presence of a secure connection https (instead of http), especially when entering personal data.

Limit the amount of personal data that is freely available.

Use only complex passwords and do not use the same passwords on multiple sites or accounts.

It is much safer to create several e-mail boxes: some for personal correspondence, the rest for identification on various sites and for spam.

Whenever possible, use only licensed software and update it regularly.

It is better to check the downloaded file before opening it both online and with the anti-virus program installed on the computer.


No comments: